Searched refs:permission (Results 1 - 23 of 23) sorted by relevance

/system/netd/include/
H A DPermission.h21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an
22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is
23 // held by the app" or "no special permission is required to use the network".
28 // android.permission.INTERNET framework permission.
31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission.
34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an
42 permissionToName(Permission permission) argument
[all...]
H A DFwmark.h30 Permission permission : 2; member in struct:Fwmark::__anon1890
/system/netd/server/
H A DPhysicalNetwork.cpp31 Permission permission, PhysicalNetwork::Delegate* delegate) {
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
36 if (int ret = delegate->addFallthrough(interface, permission)) {
43 Permission permission,
46 permission)) {
50 if (int ret = delegate->removeFallthrough(interface, permission)) {
72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument
73 if (permission == PERMISSION_NONE) return 0;
77 ALOGE("Error closing sockets for netId %d permission change", mNetId);
80 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission,
30 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
42 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument
89 setPermission(Permission permission) argument
[all...]
H A DPhysicalNetwork.h33 Permission permission) WARN_UNUSED_RESULT = 0;
35 Permission permission) WARN_UNUSED_RESULT = 0;
43 int setPermission(Permission permission) WARN_UNUSED_RESULT;
52 int destroySocketsLackingPermission(Permission permission);
H A DRouteController.h50 Permission permission) WARN_UNUSED_RESULT;
52 Permission permission) WARN_UNUSED_RESULT;
74 Permission permission) WARN_UNUSED_RESULT;
76 Permission permission) WARN_UNUSED_RESULT;
91 Permission permission) WARN_UNUSED_RESULT;
93 Permission permission) WARN_UNUSED_RESULT;
108 Permission permission, bool add);
H A DRouteController.cpp417 Permission permission, bool add) {
423 fwmark.permission = permission;
486 fwmark.permission = PERMISSION_SYSTEM;
487 mask.permission = PERMISSION_SYSTEM;
503 Permission permission, uid_t uidStart,
514 fwmark.permission = permission;
515 mask.permission = permission;
416 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument
502 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
525 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
553 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument
576 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
709 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
787 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument
942 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
951 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument
1019 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument
1023 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument
1046 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
1051 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
[all...]
H A DFwmarkServer.cpp91 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local
94 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) {
120 permission = static_cast<Permission>(permission | fwmark.permission);
204 permission = PERMISSION_NONE;
230 permission = static_cast<Permission>(permission | fwmark.permission);
235 if ((permission
[all...]
H A DNetworkController.cpp76 Permission permission, bool add) WARN_UNUSED_RESULT;
80 Permission permission) override WARN_UNUSED_RESULT;
82 Permission permission) override WARN_UNUSED_RESULT;
84 int modifyFallthrough(const std::string& physicalInterface, Permission permission,
99 Permission permission, bool add) {
103 permission)) {
111 permission)) {
121 Permission permission) {
122 return modifyFallthrough(physicalInterface, permission, true);
126 Permission permission) {
97 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument
120 addFallthrough(const std::string& physicalInterface, Permission permission) argument
125 removeFallthrough(const std::string& physicalInterface, Permission permission) argument
130 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument
324 createPhysicalNetwork(unsigned netId, Permission permission) argument
439 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument
452 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument
553 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local
670 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local
[all...]
H A DNetworkController.h69 int createPhysicalNetwork(unsigned netId, Permission permission) WARN_UNUSED_RESULT;
77 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
79 int setPermissionForNetworks(Permission permission,
H A DNetdNativeService.cpp48 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL";
49 const char DUMP[] = "android.permission.DUMP";
51 binder::Status checkPermission(const char *permission) { argument
55 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) {
58 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission);
84 #define ENFORCE_PERMISSION(permission) { \
85 binder::Status status = checkPermission((permission)); \
91 #define NETD_LOCKING_RPC(permission, lock) \
92 ENFORCE_PERMISSION(permission); \
[all...]
H A DClatdController.cpp78 fwmark.permission = PERMISSION_SYSTEM;
H A DSockDiag.h72 int destroySocketsLackingPermission(unsigned netId, Permission permission,
H A DSockDiagTest.cpp290 Permission permission; member in struct:android::net::__anon1908
357 fwmark.permission = permissionTestcases[i].permission;
424 Permission permission = permissionTestcases[i].permission;
425 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
H A DSockDiag.cpp389 // 1. The opening app no longer has permission to use this network, or:
390 // 2. The opening app does have permission, but did not explicitly select this network.
397 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument
413 controlMark.permission = permission;
434 // If explicit and permission bits match, go to the JMP below which rejects the socket
468 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) {
473 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms",
474 mSocketsDestroyed, netId, permission, s.timeTaken());
H A DTetherController.cpp180 fwmark.permission = PERMISSION_SYSTEM;
253 fwmark.permission = PERMISSION_SYSTEM;
H A DCommandListener.cpp1437 // network create <netId> [permission]
1455 Permission permission = PERMISSION_NONE; local
1457 permission = stringToPermission(argv[3]);
1458 if (permission == PERMISSION_NONE) {
1459 return syntaxError(client, "Unknown permission");
1462 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) {
1505 // network permission user set <permission> <uid> ...
1506 // network permission user clear <uid> ...
1507 // network permission networ
1514 Permission permission = PERMISSION_NONE; local
[all...]
/system/security/keystore/
H A Dkey_store_service.h155 * permission and if acting on other uids the grants to do so.
157 bool checkBinderPermission(perm_t permission, int32_t targetUid = UID_SELF);
161 * permission and the target uid is the caller or the caller is system.
163 bool checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid);
167 * permission or the target of the operation is the caller's uid. This is
168 * for operation where the permission is only for cross-uid activity and all
172 bool checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid);
175 * Helper method to check that the caller has the required permission as
178 * Returns NO_ERROR on success, PERMISSION_DENIED on a permission error and
182 KeyStoreServiceReturnCode checkBinderPermissionAndKeystoreState(perm_t permission,
[all...]
H A Dkey_store_service.cpp554 ALOGW("permission denied for %d: getmtime", targetUid);
589 ALOGW("permission denied for %d: duplicate", callingUid);
1318 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid());
1432 sp<IBinder> binder = defaultServiceManager()->getService(String16("permission"));
1437 String16("android.permission.READ_PRIVILEGED_PHONE_STATE"),
1500 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only.
1535 * permission and if acting on other uids the grants to do so.
1537 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument
1540 if (!has_permission(callingUid, permission, spid)) {
1541 ALOGW("permission
1555 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument
1572 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument
1590 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument
[all...]
/system/bt/stack/gatt/
H A Dgatt_db.cc83 tGATT_PERM perm = attr.permission;
168 __func__, attr16.uuid, attr16.permission, sec_flag, offset, read_long);
355 * perm: permission (authentication and key size requirements)
426 * perm: characteristic descriptor permission type.
555 tGATT_PERM perm = p_attr->permission;
560 GATT_TRACE_DEBUG("%s: p_attr->permission =0x%04x min_key_size==0x%04x",
561 __func__, p_attr->permission, min_key_size);
721 attr.permission = perm;
H A Dgatt_int.h170 tGATT_PERM permission; member in struct:__anon915
/system/nfc/halimpl/bcm2079x/gki/common/
H A Dgki_buffer.c1093 ** permission - (input) GKI_PUBLIC_POOL or
1100 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument
1104 if (permission == GKI_RESTRICTED_POOL)
1344 ** permission - (input) restricted or public access?
1355 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument
1384 (void)GKI_set_pool_permission(xx, permission);
/system/nfc/src/gki/common/
H A Dgki_buffer.c1093 ** permission - (input) GKI_PUBLIC_POOL or GKI_RESTRICTED_POOL
1099 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument
1103 if (permission == GKI_RESTRICTED_POOL)
1340 ** permission - (input) restricted or public access?
1350 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument
1379 (void)GKI_set_pool_permission(xx, permission);
/system/tpm/tpm_manager/server/
H A Dtpm_nvram_impl.cc435 MapAttributesFromTpm(info.permission.attributes, attributes);

Completed in 559 milliseconds